A system which employs a pair of encryption functions f and g in the "log on" protocol of a computer dial-up arrangement. The functions are inverses of each other and, hence, a random sequence when encrypted with f and then with g results in the original sequence. When a user wishes to "log on", the computer selects a random sequence and forms a challenge sequence. The user encrypts the challenge sequence with the function g and thus forms a response sequence. encryption with the function f by the computer permits verification of the response sequence.

The secrecy of the user's function is maintained by providing the user with an authenticating device having only two ports: a power port and an I/O port. The I/O port is connected to a microprocessor which accesses a memory that contains the secret encryption function g.

Patent
   4590470
Priority
Jul 11 1983
Filed
Jul 11 1983
Issued
May 20 1986
Expiry
Jul 11 2003
Assg.orig
Entity
Large
116
7
all paid
5. An authentication system comprising:
first means for generating essentially random signal sequences (10);
a two-way communication link (111 and 112);
second means (30) for receiving signals from said communications link, coding said received signals with a private key to develop encrypted signals and applying said encrypted signals to said communication link; and
third means (20) for controlling communications between said first means and said second means, for coding said encrypted signals with a public key to develop deciphered signals and for comparing said deciphered signals to said signal sequences.
1. A communication system employing a two-way communication link (111 and 112), first means (10 and 20) connected to said link for initiating an authentication protocol and second means (30) connected to said link for responding to initiated authentication protocol, characterized in that:
said communication system employs a public key encryption approach characterized by a pair of encryption functions, one being a public key and the other being a private key; and
said first means comprises: a generator (10) for initiating a protocol by developing an essentially random authentication message, third means for sending a challenge signal over said link to said second means, and fourth means for comparing said authentication message with a response signal sent by said second means.
2. The system of claim 1 wherein
said generator (10) develops an essentially random authentication message;
said third means comprises a coder (21) responsive to said generator for encrypting said authentication message with one encryption function of said pair of encryption functions to develop said challenge signal, and for applying said challenge signal to said comunication link;
said second means enciphers said challenge signal with the other encryption function of said pair of encryption functions to develop response signal; and
said fourth means comprises comparison means (22) for comparing said authentication message to said response signal sent by said second means.
3. The system of claim 1 wherein
said generator (10) develops an essentially random authentication message and applies said message to said communication link as said challenge signal;
said second means enciphers said challenge signals with one encryption formation of said pair of encryption functions; and
said third means comprises a coder (21) responsive to said response signal for encrypting said response signal with the other encryption function of said pair of encryption functions to develop a decrypted response signal, and comparison means (22) for comparing said authentication message to said decrypted response signal.
4. The system of claim 1 wherein said second means develops said response signal by encrypting said authentication message with an encryption function g and said first means includes coding means (21) for encrypting signals with an encryption function f that is the inverse function of g.

This invention relates to authentication systems that protect against unauthorized access to a facility, such as a building or a host computer.

The use of computers has matured to the point where they are often relied upon to store and process sensitive information. Even banking functions such as fund transfers and dispensing of cash are now often controlled with computers. Naturally, such computers are attractive targets to interlopers wishing to gain unauthorized entry; particularly in systems that interact with users directly.

To provide for the needed security, computer systems that permit electronic "dial-up" access generally control the access by identifying each authorized user with a secret password which is communicated to the computer during the initial protocol between the user and the computer system. The password is most commonly sent through a typewriter-like terminal, through a key pad similar to that of a touch-tone telephone, or through a credit card-like device that contains an electronically readable magnetic strip.

Unfortunately, these means for user authentication are often not very effective against a sophisticated interloper.

One way in which a password's integrity can be compromised is by gaining access to the password file within the host computer. This can occur, for example, by corrupting the computer operator. However, this is the most risky approach for an interloper and is, therefore, generally not a problem. Also, access to the password file can be made quite difficult by encrypting the file.

A second way in which a password's integrity can be compromised is by intercepting the user's communication with the computer. This can be done by wiretapping and eavesdropping of the protocol between the user and the computer and recording the password as it is transmitted. Alternatively, the computer's "log on" protocol can be mimiced, thereby tricking the user into divulging the password.

A third, and the most common way, in which a password's integrity is lost is through misuse of the password by the user. Computer users tend to be careless by selecting passwords that are relatively easy to guess. Sometimes users lend their passwords to others and forget to change them. Even having the computer system select the passwords does not solve the problem, because the resulting passwords are often so obscure that users tend to write them down and keep them in physical proximity to the teminals. Of course, that makes unauthorized access even easier.

Various systems are found in the art for reducing the risk of password exposure.

W. P. Flies, in U.S. Pat. No. 4,297,569 issued Oct. 27, 1981 describes a key-like device that is small enough to be carried on the person of the user. That device, carrying microelectronic memory circuits is adapted to be inserted or otherwise connected to a computer and to make its data available to the system. This data forms the secret password, which can be as complex as the memory circuits permit.

The disadvantage of the Flies key-like device, paralleling the problem of conventional door keys, lies in the fact that a possessor of the key can copy the information it carries. Also, the Flies device does not circumvent the wiretapping problem.

A similar concept is described by J. Dethloff in U.S. Pat. No. 4,105,156 issued Aug. 8, 1978, where the key-like device is shown in the form of a credit card. Rather than mere memory circuits, the Dethloff device contains a microprocessing unit, a memory unit for controlling the microprocessor and a separate memory for storing the password. The desired password is entered into the separate memory once, and the path to that memory is burned to permanently prevent reading or altering the password memory through the port by which the password was entered. The card communicates with the host computer only through its I/O port which is connected to the microprocessor. The Dethloff device divulges its password only when the correct query sequence is presented at its I/O port, but such a query can be designed to be so complex as to make the password practically unattainable by a possessor of the card.

The Dethloff device remedies the main drawback of the Flies device, but it is still subject to compromise through eavesdropping and/or protocol mimicing.

S. T. Kent, et al., in an article entitled "Personal Authentication System for Access Control to the Defense Data Network," Conference Record of Eascon, pp. 89-93, describe a system aimed to prevent the compromise of passwords through wiretapping. They suggest a challenge-response scheme where the computer system issues a challenge to the user, who must generate a response that is some function of the challenge. For example, a user may be required to transform a random numeric challenge into a response based on knowledge of some secret parameter and an algorithm (which may or may not be secret). The system has available both the secret parameter and the algorithm, so it can perform the calculation to verify the response submitted by the user.

The Kent, et al., proposal suggests the use of both a memorized password and an authenticating device. The authenticating device is an encryption key, either recorded on a magnetic-type card or stored in an inexpensive device containing the Data Encryption Standard (DES) algorithm adopted by the U.S. Bureau of Standards.

The problem with the Kent, et al., system is that a possessor of the authenticating device containing the encryption key can duplicate the key, resulting in the memorized password being the sole barrier to unauthorized access.

In an article entitled "Password Authentication with Insecure Communication," Communications of the ACM, November, 1981, Vol. 24, No. 11, pp. 770-772, L. Lamport suggests the use of encryption functions as the challenge-response pairs. Lamport suggests that the host computer choose a sequence of passwords x1,x2, . . . ,x1000, where xi is the password by which the user identifies himself for the ith time. The system must know the sequence y1,y2, . . . , y1000, where yi =F(xi) and the yi are distinct to prevent an intruder from reusing a prior password. The function F is a one-way mapping function which encrypts the password x and is such that each user password is the value needed by the system to authenticate the next password.

The Lamport system is quite powerful because each communication between the user and the host computer is unique and the function F, which is employed to authenticate the password, cannot be deciphered. The drawback of the Lamport system, however, is that the set of passwords is fixed apriori and is finite. That means that after a fixed number of communications the user must be given a new set of password functions.

It is the object of this invention to provide a user authentication system that safeguards against an unauthorized access. It is a further object of this invention to provide a system that protects passwords from compromise by copying through temporary authorized access to the password. It is a still further object of this invention to provide a system that protects passwords from compromise to wiretapping interlopers who record transmitted passwords or who mimic computer protocol.

These and other objects and advantages are realized in accordance with the principles of my invention by a system which employs a pair of encryption functions and a random message in the "log on" protocol. The functions, f and g, are such that a sequence encrypted with f and then with g results in the original sequence. When a user wishes to "log on", the computer selects an essentially random sequence A and forms the challenge sequence by encrypting A with the function f. The user encrypts f(A) with the function g and thus forms the response sequence. The secrecy of the user's function is maintained by providing the user with an authenticating device having ony two ports: a power port (battery and ground) and an I/O port. The I/O port is connected to a microprocessor which has access to a memory that contains the secret encryption function.

FIG. 1 presents a block diagram of the authentication system of my invention;

FIGS. 2 and 3 present diagrams of the system of FIG. 1 that depict two specific realizations for element 20 in FIG. 1; and

FIG. 4 illustrates the two port realization for coder 30.

In 1976 Diffie and Hellman introduced the revolutionary concept of public-key encryption. Unlike the classical cryptosystems, in a public-key cryptosystem the encryption and the decryption keys are different. Moreover, given just one of the two keys, it is essentially impossible to calculate the other key, although it is simple to create a matched pair of keys in the first place. Thus, a pair of functions, f and g, can easily be created such that a plaintext message m, when encrypted with f to form f(m), can be decrypted with g.

A number of ways are known in the art for generating the functions f and g. Rivest, Shamir and Adelman, for example, have described one method which is based on the fact that it is easy to generate two large prime numbers and multiply them together, but it is computationally prohibitive to factor the resulting product. This method, which is described in an article titled "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Vol. 21, pp. 120-126, February 1978, can be summarized in the following steps:

1. select prime numbers, p and q;

2. compute n=(p)(q) and k=(p-1)(q-1);

3. select a random number, f, relatively prime to k;

4. compute g such that (f)(g)=1 mod k;

5. develop encrypted message, x, from plaintext message, m (an integer between 1 and k-1), by calculating mf mod n;

6. decrypt message m by calculating xg mod k.

Another algorithm for obtaining the functions f and g is presented by D. E. Knuth in "The Art of Computer Programming," Vol. 2, "Seminumerical Algorithms," pp. 386-394 published by Addison-Wesley Publishing Co. in 1981.

The system of FIG. 1 employs the public-key two function concept, and enhances it by employing an essentially random message m in the authentication protocol. By "essentially" random I mean that the message is randomly selected from the domain of the encryption function f.

More specifically with regard to the FIG. 1 system, a user wishing to gain access signals the authentication equipment (elements 10 and 20 in FIG. 1) and that equipment initiates the authentication protocol. Generator 10 selects an essentially random sequence as the challenge message m, element 20 challenges the user via line 111, the user operates on the signal of line 111 within coder 30 and responds on line 112, and element 20 evaluates the user's response.

FIGS. 2 and 3 present two essentially equivalent embodiments of the authentication system of FIG. 1, depicting different realizations for element 20 in more detail. In FIG. 2, coder 21 encrypts the plaintext message m and sends the encrypted message f(m) to coder 30 via line 111. Coder 30 decrypts the message and sends the decrypted message g(f(m)) back to element 20. Element 22 compares the decrypted message to the original message and since f and g are inverses of each other, g(f(m)) equals m, and element 22 is satisfied.

In the FIG. 3 system, the message m is sent to line 111 unaltered, the user encrypts the message in coder 30 and sends the encrypted message g(m) over line 112. Coder 21 decrypts g(m) with the function f, developing f(g(m)), and element 22 compares f(g(m)) to m. Again, since g and f are inverses of each other, f(g(m)) equals m and element 22 indicates that access should be granted.

Realization of the elements depicted in FIGS. 2 and 3 can be attained with conventional hardware. Generator 10, for example, is realized with an A/D converter having thermal noise at its input. The random sequence of 1's and 0's out of the converter is loaded into a modulo n register and the output of the register is sent to element 20.

Comparison element 22 is a conventional comparison device comprising Exclusive OR and AND gates.

Coder elements 21 and 30 perform essentially the same function (encryption with f and g, respectively) and can therefore be implemented similarly. With the Rivest, Shamir and Adelman (RSA) method, the encryption requires raising an incoming numerical sequence to a predetermined power in predetermined modulo arithmetic. This is achieved through a multiplication and division process as described in the aforementioned Rivest, et al., article (Sec. VII-A) in a simple microprocessor under control of a stored algorithm.

The system of FIG. 1 is quite robust because it employs four parameters in the authentication protocol: the functions f and g, the modulos n (in the RSA method), and the essentially random message m. Because of the randomness in message m, even wiretapping and recording of a valid protocol sequence can be of no help in responding at a subsequent protocol.

It should be noted that the FIG. 1 authentication system requires the user to possess local computing power, embodied in coder 30. Although such computing power removes the need for people to remember or write down their passwords, the existence of local computing power might make it possible to steal someone's password (the function g and the modulos n) by examining the memory within coder 30. This is avoided, in accordance with the principles of my invention, by implementing coder 30 in a portable device, such as a card or a key, and by arranging the device to have only two accessible ports: a power and ground port, and an I/O port. As shown in FIG. 4, such a device needs to contain only a microprocessor or some other computing device, e.g., procesor 31, which communicates with lines 111 and 112 via the I/O port, and a memory device 32 for storing the algorithm and the selected parameters, which communicates only with processor 31. The power port merely supplys the necessary power to coder 30 and cannot divulge any information.

Koenig, Andrew R.

Patent Priority Assignee Title
10163137, Feb 05 2003 HOFFBERG FAMILY TRUST 2 System and method for incentivizing participation in a market transaction
10242177, Mar 29 2012 Nokia Technologies Oy Wireless memory device authentication
10361802, Feb 01 1999 Blanding Hovenweep, LLC; HOFFBERG FAMILY TRUST 1 Adaptive pattern recognition based control system and method
10567975, Oct 04 2005 HOFFBERG FAMILY TRUST 2 Multifactorial optimization system and method
10652743, Dec 21 2017 The Chamberlain Group, Inc Security system for a moveable barrier operator
10862924, Jun 30 2005 The Chamberlain Group, Inc Method and apparatus to facilitate message transmission and reception using different transmission characteristics
10943273, Feb 05 2003 HOFFBERG FAMILY TRUST 2 System and method for determining contingent relevance
10944559, Jan 27 2005 The Chamberlain Group, Inc Transmission of data including conversion of ternary data to binary data
10997810, May 16 2019 The Chamberlain Group, Inc In-vehicle transmitter training
11074773, Jun 27 2018 The Chamberlain Group, Inc Network-based control of movable barrier operators for autonomous vehicles
11122430, Dec 21 2017 The Chamberlain Group, Inc. Security system for a moveable barrier operator
11423717, Aug 01 2018 The Chamberlain Group, Inc Movable barrier operator and transmitter pairing over a network
11462067, May 16 2019 The Chamberlain Group LLC In-vehicle transmitter training
11763616, Jun 27 2018 The Chamberlain Group LLC Network-based control of movable barrier operators for autonomous vehicles
11778464, Dec 21 2017 The Chamberlain Group LLC Security system for a moveable barrier operator
11790413, Feb 05 2003 HOFFBERG FAMILY TRUST 2 System and method for communication
11799648, Jan 27 2005 The Chamberlain Group LLC Method and apparatus to facilitate transmission of an encrypted rolling code
11869289, Aug 01 2018 The Chamberlain Group LLC Movable barrier operator and transmitter pairing over a network
4672533, Dec 19 1984 COMMUNICATIONS LINK CONTROL,INC Electronic linkage interface control security system and method
4807139, Mar 15 1985 Ascom Hasler AG System for release and control of preset storage of a postage meter machine
4823388, Jun 25 1984 Kabushiki Kaisha Toshiba Communications network using an enciphering and deciphering device
4847902, Feb 10 1984 Bankers Trust Company Digital computer system for executing encrypted programs
4864494, Mar 21 1986 COMPUTERIZED DATA SYSTEMS FOR MANUFACTURING, INC , CDSM A CORP OF AZ Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
4866769, Aug 05 1987 IBM Corporation Hardware assist for protecting PC software
4879747, Mar 21 1988 YAMA CAPITAL, LLC Method and system for personal identification
4907268, Nov 03 1986 Secure Computing Corporation Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer
4926480, Aug 22 1983 VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY Card-computer moderated systems
4935961, Jul 27 1988 PITNEY BOWES INC , WORL HEADQUARTER, STAMFORD, CONNECTICUT, A CORP OFDE Method and apparatus for the generation and synchronization of cryptographic keys
4947430, Nov 23 1987 VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY Undeniable signature systems
4992783, Apr 04 1988 Motorola, Inc. Method and apparatus for controlling access to a communication system
4995081, Mar 21 1988 YAMA CAPITAL, LLC Method and system for personal identification using proofs of legitimacy
5016274, Nov 08 1988 On-line/off-line digital signing
5153581, Jun 16 1986 CP8 Technologies Method for authentication by an external medium of a portable object such as a memory card coupled to this medium
5196840, Nov 05 1990 International Business Machines Corporation Secure communications system for remotely located computers
5267314, Nov 17 1992 Secure transaction system and method utilized therein
5442342, Aug 29 1990 Hughes Electronics Corporation Distributed user authentication protocol
5485622, Oct 11 1991 Kabushiki Kaisha Toshiba Password processing system for computer
5488649, May 06 1994 Google Technology Holdings LLC Method for validating a communication link
5517187, May 29 1990 Microchip Technology Incorporated; INTENCO S A Microchips and remote control devices comprising same
5524073, Nov 17 1992 Secure transaction system and method utilized therein
5555303, Sep 14 1993 Secure transaction system and method utilized therein
5557765, Aug 11 1994 McAfee, Inc System and method for data recovery
5646998, Nov 17 1992 Secure transaction system and method utilized therein
5661803, Mar 31 1995 Pitney Bowes Inc Method of token verification in a key management system
5680456, Mar 31 1995 Pitney Bowes Inc Method of manufacturing generic meters in a key management system
5686904, Dec 04 1992 Microchip Technology Incorporated; INTENCO S A Secure self learning system
5742682, Mar 31 1995 Pitney Bowes Inc. Method of manufacturing secure boxes in a key management system
5745573, Aug 11 1994 McAfee, Inc System and method for controlling access to a user secret
5793302, Nov 17 1992 Method for securing information relevant to a transaction
5793866, Dec 13 1995 Google Technology Holdings LLC Communication method and device
5812666, Mar 31 1995 Pitney Bowes Inc. Cryptographic key management and validation system
5825300, Nov 08 1993 ALLEN SYSTEMS GROUP, INC Method of protected distribution of keying and certificate material
5841866, Sep 30 1994 Microchip Technology Incorporated; INTENCO S A Secure token integrated circuit and method of performing a secure authentication function or transaction
5872917, Jun 07 1995 HELLMAN, MARTIN Authentication using random challenges
5901284, Jun 19 1996 BELLSOUTH INTELLECTUAL PROPERTY GROUP, INC Method and system for communication access restriction
5936541, Nov 17 1992 Method for securing information relevant to a transaction
5956403, Aug 11 1994 McAfee, Inc System and method for access field verification
5974148, Nov 17 1992 Method for securing information relevant to a transaction
5991406, Aug 11 1994 McAfee, Inc System and method for data recovery
6047066, Dec 13 1995 Google Technology Holdings LLC Communication method and device
6049289, Sep 06 1996 MICROCHIP TECHNOLOGY INC Remote controlled garage door opening system
6108326, May 08 1997 Microchip Technology Incorporated Microchips and remote control devices comprising same
6154544, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
6166650, Dec 04 1992 Microchip Technology Incorporated Secure self learning system
6175312, May 29 1990 Microchip Technology Incorporated; INTENCO S A Encoder and decoder microchips and remote control devices for secure unidirectional communication
6191701, Aug 25 1995 Microchip Technology Incorporated; INTENCO S A Secure self learning system
6272632, Feb 21 1995 McAfee, Inc System and method for controlling access to a user secret using a key recovery field
6667684, Sep 06 1996 Overhead Door Corporation; Microchip Technology, Inc. Remote controlled garage door opening system
6674703, Jan 29 1992 Matsushita Electric Industrial Co., Ltd. Medium, apparatus, and method related to encryption resultant information
6690796, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
6859427, Jan 29 1992 Matsushita Electric Industrial Co., Ltd. Medium, apparatus, and method related to encryption resultant information
6910697, Dec 15 2000 Symbol Technologies, LLC Shopping cart that enables self-checkout
6975092, Jul 03 2003 Dell Products L.P. Encrypted response smart battery
6980313, Jul 11 2000 Fax-compatible internet appliance
6980655, Jan 21 2000 The Chamberlain Group, Inc. Rolling code security system
6985472, May 08 1997 MICROCHIP TECHNOLOGY INC Method of communication using an encoder microchip and a decoder microchip
7181017, Mar 23 2001 RPX Corporation System and method for secure three-party communications
7181433, Aug 22 2000 TOKEN ONE PTY LTD Validation of transactions
7194513, Jul 08 2001 UNIGA KK; UNIQA KK System and method for using an internet appliance to send/receive digital content files as E-mail attachments
7245291, Jul 11 2000 System and method for internet appliance data entry and navigation
7376073, Dec 14 2000 SCA IPLA HOLDINGS INC Optical storage medium having distortion regions, and a method of modifying an optical storage medium to include distortion regions
7412056, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
7454617, Jul 10 1998 Memjet Technology Limited Apparatus for validating the presence of an authorized accessory
7492898, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
7492905, May 17 1995 CHAMBERLAIN GROUP, INC , THE Rolling code security system
7529939, Dec 19 2000 MICROCHIP TECHNOLOGY INC ; MICROCHIP TECHNOLOGY BARBADOS , II, INC Method of and apparatus for transferring data
7562396, Aug 21 2001 SCA IPLA HOLDINGS INC Systems and methods for media authentication
7571116, May 09 1997 Symbol Technologies, LLC System for consumer-transaction information that follows the consumer
7587368, Jul 05 2001 RPX Corporation Information record infrastructure, system and method
7623663, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
7643393, Dec 12 2001 SCA IPLA HOLDINGS INC Systems and methods for optical media modification
7694330, May 23 2003 Industrial Technology Research Institute; KUNG, HSIANG-TSUNG Personal authentication device and system and method thereof
7716485, Feb 01 2002 SCA IPLA HOLDINGS INC Systems and methods for media authentication
7792522, Jan 13 2006 Positive Access Corporation Software key control for mobile devices
7944806, Dec 14 2000 SCA IPLA HOLDINGS INC Method for modifying optical path on optical recording medium having distortion regions
7986778, Jun 23 2004 MARQETA, INC Cryptographic method and apparatus
8095798, Feb 01 2002 SCA IPLA Holdings Inc. Systems and methods for media authentication
8166549, Jun 14 2001 Stragent, LLC Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
8190513, Feb 08 1999 Fraud Control Systems.com Corporation Method of billing a purchase made over a computer network
8194856, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
8204945, Jun 19 2000 Stragent, LLC Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
8229844, Jun 05 1996 Fraud Control Systems.com Corporation Method of billing a purchase made over a computer network
8233625, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
8272060, Jun 14 2001 Stragent, LLC Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
8284021, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
8532640, Jan 13 2006 Positive Access Corporation Software key control for mobile devices
8600830, Feb 05 2003 HOFFBERG FAMILY TRUST 2 System and method for providing a payment to a non-winning auction participant
8630942, Jun 05 1996 Fraud Control Systems.com Corporation Method of billing a purchase made over a computer network
8633797, May 17 1995 The Chamberlain Group, Inc. Rolling code security system
8904181, Mar 25 2002 RPX Corporation System and method for secure three-party communications
9419951, Mar 23 2001 RPX Corporation System and method for secure three-party communications
9794797, Oct 04 2005 Multifactorial optimization system and method
9818136, Feb 05 2003 System and method for determining contingent relevance
RE40957, Jan 29 1992 Panasonic Corporation Medium, apparatus, and method related to encryption resultant information
RE40958, Jan 29 1992 Panasonic Corporation Medium, apparatus, and method related to encryption resultant information
RE49334, Oct 04 2005 HOFFBERG FAMILY TRUST 2 Multifactorial optimization system and method
Patent Priority Assignee Title
3806874,
4105156, Sep 06 1976 MATSUSHITA ELECTRINC COMPONENTS CO , LTD , 1006 OAZA KADOMA, KADOMA, OSAKA, JAPAN A CORP OF JAPAN Identification system safeguarded against misuse
4281215, May 03 1978 Atalla Technovations Method and apparatus for securing data transmissions
4297569, Jun 28 1979 Datakey, Inc. Microelectronic memory key with receptacle and systems therefor
4349695, Jun 25 1979 Datotek, Inc. Recipient and message authentication method and system
4438824, Apr 22 1981 Siemens Corporation Apparatus and method for cryptographic identity verification
4467139, Apr 09 1980 Compagnie Internationale pour l'Informatique Cii Honeywell Bull Process and system for transmission of signed messages
//
Executed onAssignorAssigneeConveyanceFrameReelDoc
Jul 05 1983KOENIG, ANDREW R BELL TELEPHONE LABORATORIES, INCORPORATED A CORP OF NY ASSIGNMENT OF ASSIGNORS INTEREST 0041530814 pdf
Jul 11 1983AT&T Bell Laboratories(assignment on the face of the patent)
Date Maintenance Fee Events
Oct 19 1989M173: Payment of Maintenance Fee, 4th Year, PL 97-247.
Oct 23 1989ASPN: Payor Number Assigned.
Sep 27 1993M184: Payment of Maintenance Fee, 8th Year, Large Entity.
Oct 21 1997M185: Payment of Maintenance Fee, 12th Year, Large Entity.
Nov 12 1997ASPN: Payor Number Assigned.
Nov 12 1997RMPN: Payer Number De-assigned.


Date Maintenance Schedule
May 20 19894 years fee payment window open
Nov 20 19896 months grace period start (w surcharge)
May 20 1990patent expiry (for year 4)
May 20 19922 years to revive unintentionally abandoned end. (for year 4)
May 20 19938 years fee payment window open
Nov 20 19936 months grace period start (w surcharge)
May 20 1994patent expiry (for year 8)
May 20 19962 years to revive unintentionally abandoned end. (for year 8)
May 20 199712 years fee payment window open
Nov 20 19976 months grace period start (w surcharge)
May 20 1998patent expiry (for year 12)
May 20 20002 years to revive unintentionally abandoned end. (for year 12)